Skip to content

Commit 7def7f5

Browse files
authored
Update code-scans.yaml
1 parent 9ce1870 commit 7def7f5

1 file changed

Lines changed: 49 additions & 47 deletions

File tree

.github/workflows/code-scans.yaml

Lines changed: 49 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -23,65 +23,67 @@ jobs:
2323
trivy_scan:
2424
name: Trivy Vulnerability Scan
2525
runs-on: self-hosted
26-
env:
27-
TRIVY_REPORT_FORMAT: table
28-
TRIVY_SCAN_TYPE: fs
29-
TRIVY_SCAN_PATH: .
30-
TRIVY_EXIT_CODE: '1'
31-
TRIVY_VULN_TYPE: os,library
32-
TRIVY_SEVERITY: CRITICAL,HIGH
3326
steps:
3427
- uses: actions/checkout@v4
3528

3629
- name: Create report directory
3730
run: mkdir -p trivy-reports
31+
32+
- name: Install Trivy
33+
run: |
34+
# Check if trivy is already installed
35+
if ! command -v trivy &> /dev/null; then
36+
wget -qO- https://github.com/aquasecurity/trivy/releases/download/v0.55.0/trivy_0.55.0_Linux-64bit.tar.gz | tar -xzv -C /tmp
37+
sudo mv /tmp/trivy /usr/local/bin/
38+
fi
39+
trivy --version
3840
3941
- name: Run Trivy FS Scan
40-
uses: aquasecurity/trivy-action@0.24.0
41-
with:
42-
scan-type: 'fs'
43-
scan-ref: '.'
44-
scan-scope: "all"
45-
scanners: 'vuln,misconfig,secret,license'
46-
ignore-unfixed: true
47-
format: 'table'
48-
exit-code: '1'
49-
output: 'trivy-reports/trivy_scan_report.txt'
50-
vuln-type: 'os,library'
51-
severity: 'CRITICAL,HIGH'
52-
- name: Run trivy Scan - vllm-cpu
53-
uses: aquasecurity/trivy-action@0.24.0
54-
id: vllm-cpu-html
55-
with:
56-
scan-type: "image"
57-
image-ref: "public.ecr.aws/q9t5s3a7/vllm-cpu-release-repo:v0.10.2"
58-
severity: "HIGH,CRITICAL"
59-
scanners: 'vuln,misconfig,secret,license'
60-
format: "table"
61-
output: "trivy-reports/trivy-vllm-cpu.txt"
42+
continue-on-error: true
43+
run: |
44+
trivy fs . \
45+
--scanners vuln,misconfig,secret \
46+
--severity CRITICAL,HIGH \
47+
--format table \
48+
--exit-code 1 \
49+
--vuln-type os,library \
50+
--output trivy-reports/trivy_scan_report.txt
51+
52+
- name: Run Trivy Image Scan - vllm-cpu
53+
continue-on-error: true
54+
run: |
55+
trivy image \
56+
--severity HIGH,CRITICAL \
57+
--format table \
58+
--exit-code 1 \
59+
--vuln-type os,library \
60+
--output trivy-reports/trivy-vllm-cpu.txt \
61+
public.ecr.aws/q9t5s3a7/vllm-cpu-release-repo:v0.10.2 || \
62+
echo "Image scan skipped - image not available locally" > trivy-reports/trivy-vllm-cpu.txt
6263
63-
- name: Run trivy Scan - vllm-gaudi
64-
uses: aquasecurity/trivy-action@0.24.0
65-
id: vllm-gaudi-html
66-
with:
67-
scan-type: "image"
68-
image-ref: "opea/vllm-gaudi:1.22.0"
69-
severity: "HIGH,CRITICAL"
70-
format: "table"
71-
scanners: 'vuln,misconfig,secret,license'
72-
output: "trivy-reports/trivy-vllm-gaudi.txt"
64+
- name: Run Trivy Image Scan - vllm-gaudi
65+
continue-on-error: true
66+
run: |
67+
trivy image \
68+
--severity HIGH,CRITICAL \
69+
--format table \
70+
--output trivy-reports/trivy-vllm-gaudi.txt \
71+
opea/vllm-gaudi:1.22.0 || \
72+
echo "Image scan skipped - image not available locally" > trivy-reports/trivy-vllm-gaudi.txt
7373
74-
- name: Upload Trivy Report
74+
- name: Upload Trivy Reports
75+
if: always()
7576
uses: actions/upload-artifact@v4
7677
with:
77-
name: trivy-report
78-
path: trivy-reports/trivy_scan_report.txt
79-
- name: Show Trivy Report in Logs
80-
if: failure()
78+
name: trivy-reports
79+
path: trivy-reports/
80+
81+
- name: Show Trivy FS Report in Logs
82+
if: always()
8183
run: |
82-
echo "========= TRIVY FINDINGS ========="
83-
cat trivy-reports/trivy_scan_report.txt
84-
echo "================================="
84+
echo "========= TRIVY FS SCAN FINDINGS ========="
85+
cat trivy-reports/trivy_scan_report.txt || echo "No FS scan report found"
86+
echo "=========================================="
8587
8688
# -----------------------------
8789
# 2) Bandit Scan

0 commit comments

Comments
 (0)